Follow
Pern Hui Chia
Pern Hui Chia
Verified email at google.com
Title
Cited by
Cited by
Year
Is this app safe? A large scale study on application permissions and risk signals
PH Chia, Y Yamamoto, N Asokan
Proceedings of the 21st international conference on World Wide Web, 311-320, 2012
3122012
Interdependent privacy: Let me share your data
G Biczók, PH Chia
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
1102013
Re-evaluating the wisdom of crowds in assessing web security
PH Chia, SJ Knapskog
Financial Cryptography and Data Security: 15th International Conference, FC …, 2012
312012
Colonel Blotto in the phishing war
PH Chia, J Chuang
Decision and Game Theory for Security: Second International Conference …, 2011
272011
Use of ratings from personalized communities for trustworthy application installation
PH Chia, AP Heiner, N Asokan
Information Security Technology for Applications: 15th Nordic Conference on …, 2012
22*2012
KHyperLogLog: Estimating reidentifiability and joinability of large data at scale
PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ...
2019 IEEE Symposium on Security and Privacy (SP), 350-364, 2019
182019
Community-based web security: complementary roles of the serious and casual contributors
PH Chia, J Chuang
Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012
142012
Colonel Blotto in web security
PH Chia
The Eleventh Workshop on Economics and Information Security, WEIS Rump Session, 2012
102012
Exploring the use of explicit trust links for filtering recommenders: a study on Epinions. com
PH Chia, G Pitsilis
Journal of information processing 19, 332-344, 2011
82011
Does trust matter for user preferences? A study on Epinions ratings
G Pitsilis, PH Chia
Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010 …, 2010
82010
Whack-a-mole: Asymmetric conflict and guerrilla warfare in web security
PH Chia, J Chuang, Y Chen
Proceedings of the 15th Annual Workshop on the Economics of Information Security, 2016
32016
Analyzing the gold star scheme in a split tor network
B Westermann, PH Chia, D Kesdogan
Security and Privacy in Communication Networks: 7th International ICST …, 2012
22012
Analyzing the incentives in Community-based Security Systems
PH Chia
2011 IEEE International Conference on Pervasive Computing and Communications …, 2011
22011
Secure software installation via social rating
PH Chia
Helsinki University of Technology, 2008
22008
Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective
PH Chia
NTNU, 2012
12012
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions. com (Special Issue on Trust Management)
PHUI CHIA, G PITSILIS
情報処理学会論文誌 論文誌ジャーナル 52 (7), 2166-2178, 2011
2011
Certification intermediaries and the alternative (poster)
PH Chia
International Conference on Financial Cryptography and Data Security, 425-425, 2010
2010
Bitcoin: P2P Digital Currency
PH Chia
KHyperLogLog
PH Chia, D Desfontaines, IM Perera, D Simmons-Marengo, C Li, WY Day, ...
Economics of Information Security
PH Chia
The system can't perform the operation now. Try again later.
Articles 1–20